web-agent-bridge 3.2.0 → 3.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (256) hide show
  1. package/LICENSE +84 -72
  2. package/README.ar.md +1304 -1152
  3. package/README.md +298 -1635
  4. package/bin/agent-runner.js +474 -474
  5. package/bin/cli.js +237 -138
  6. package/bin/wab-init.js +223 -0
  7. package/bin/wab.js +80 -80
  8. package/examples/azure-dns-wab.js +83 -0
  9. package/examples/bidi-agent.js +119 -119
  10. package/examples/cloudflare-wab-dns.js +121 -0
  11. package/examples/cpanel-wab-dns.js +114 -0
  12. package/examples/cross-site-agent.js +91 -91
  13. package/examples/dns-discovery-agent.js +166 -0
  14. package/examples/gcp-dns-wab.js +76 -0
  15. package/examples/governance-agent.js +169 -0
  16. package/examples/mcp-agent.js +94 -94
  17. package/examples/next-app-router/README.md +44 -44
  18. package/examples/plesk-wab-dns.js +103 -0
  19. package/examples/puppeteer-agent.js +108 -108
  20. package/examples/route53-wab-dns.js +144 -0
  21. package/examples/saas-dashboard/README.md +55 -55
  22. package/examples/safe-mode-agent.js +96 -0
  23. package/examples/shopify-hydrogen/README.md +74 -74
  24. package/examples/vision-agent.js +171 -171
  25. package/examples/wab-sign.js +74 -0
  26. package/examples/wab-verify.js +60 -0
  27. package/examples/wordpress-elementor/README.md +77 -77
  28. package/package.json +19 -6
  29. package/public/.well-known/agent-tools.json +180 -180
  30. package/public/.well-known/ai-assets.json +59 -59
  31. package/public/.well-known/security.txt +8 -0
  32. package/public/.well-known/wab.json +28 -0
  33. package/public/activate.html +368 -0
  34. package/public/adoption-metrics.html +188 -0
  35. package/public/agent-workspace.html +349 -349
  36. package/public/ai.html +198 -198
  37. package/public/api.html +413 -412
  38. package/public/azure-dns-integration.html +289 -0
  39. package/public/browser.html +486 -486
  40. package/public/cloudflare-integration.html +380 -0
  41. package/public/commander-dashboard.html +243 -243
  42. package/public/cookies.html +210 -210
  43. package/public/cpanel-integration.html +398 -0
  44. package/public/css/agent-workspace.css +1713 -1713
  45. package/public/css/premium.css +317 -317
  46. package/public/css/styles.css +1263 -1235
  47. package/public/dashboard.html +707 -706
  48. package/public/dns.html +436 -0
  49. package/public/docs.html +588 -587
  50. package/public/feed.xml +89 -89
  51. package/public/gcp-dns-integration.html +318 -0
  52. package/public/growth.html +465 -463
  53. package/public/index.html +1266 -982
  54. package/public/integrations.html +556 -0
  55. package/public/js/activate.js +145 -0
  56. package/public/js/agent-workspace.js +1740 -1740
  57. package/public/js/auth-nav.js +65 -31
  58. package/public/js/auth-redirect.js +12 -12
  59. package/public/js/cookie-consent.js +56 -56
  60. package/public/js/dns.js +438 -0
  61. package/public/js/wab-demo-page.js +721 -721
  62. package/public/js/ws-client.js +74 -74
  63. package/public/llms-full.txt +360 -360
  64. package/public/llms.txt +125 -125
  65. package/public/login.html +85 -85
  66. package/public/mesh-dashboard.html +328 -328
  67. package/public/openapi.json +669 -580
  68. package/public/phone-shield.html +281 -0
  69. package/public/plesk-integration.html +375 -0
  70. package/public/premium-dashboard.html +2489 -2489
  71. package/public/premium.html +793 -793
  72. package/public/privacy.html +297 -297
  73. package/public/provider-onboarding.html +172 -0
  74. package/public/provider-sandbox.html +134 -0
  75. package/public/providers.html +359 -0
  76. package/public/register.html +105 -105
  77. package/public/registrar-integrations.html +141 -0
  78. package/public/robots.txt +99 -87
  79. package/public/route53-integration.html +531 -0
  80. package/public/script/wab-consent.d.ts +36 -36
  81. package/public/script/wab-consent.js +104 -104
  82. package/public/script/wab-schema.js +131 -131
  83. package/public/script/wab.d.ts +108 -108
  84. package/public/script/wab.min.js +580 -580
  85. package/public/security.txt +8 -0
  86. package/public/shieldqr.html +231 -0
  87. package/public/sitemap.xml +6 -0
  88. package/public/terms.html +256 -256
  89. package/public/wab-trust.html +200 -0
  90. package/public/wab-vs-protocols.html +210 -0
  91. package/public/whitepaper.html +449 -0
  92. package/script/ai-agent-bridge.js +1754 -1754
  93. package/sdk/README.md +99 -99
  94. package/sdk/agent-mesh.js +449 -449
  95. package/sdk/auto-discovery.js +288 -0
  96. package/sdk/commander.js +262 -262
  97. package/sdk/governance.js +262 -0
  98. package/sdk/index.d.ts +464 -464
  99. package/sdk/index.js +25 -1
  100. package/sdk/multi-agent.js +318 -318
  101. package/sdk/package.json +2 -2
  102. package/sdk/safe-mode.js +221 -0
  103. package/sdk/safety-shield.js +219 -0
  104. package/sdk/schema-discovery.js +83 -83
  105. package/server/adapters/index.js +520 -520
  106. package/server/config/plans.js +367 -367
  107. package/server/config/secrets.js +102 -102
  108. package/server/control-plane/index.js +301 -301
  109. package/server/data-plane/index.js +354 -354
  110. package/server/index.js +670 -427
  111. package/server/llm/index.js +404 -404
  112. package/server/middleware/adminAuth.js +35 -35
  113. package/server/middleware/auth.js +50 -50
  114. package/server/middleware/featureGate.js +88 -88
  115. package/server/middleware/rateLimits.js +100 -100
  116. package/server/middleware/sensitiveAction.js +157 -0
  117. package/server/migrations/001_add_analytics_indexes.sql +7 -7
  118. package/server/migrations/002_premium_features.sql +418 -418
  119. package/server/migrations/003_ads_integer_cents.sql +33 -33
  120. package/server/migrations/004_agent_os.sql +158 -158
  121. package/server/migrations/005_marketplace_metering.sql +126 -126
  122. package/server/migrations/007_governance.sql +106 -0
  123. package/server/migrations/008_plans.sql +144 -0
  124. package/server/migrations/009_shieldqr.sql +30 -0
  125. package/server/migrations/010_extended_trust.sql +33 -0
  126. package/server/models/adapters/index.js +33 -33
  127. package/server/models/adapters/mysql.js +183 -183
  128. package/server/models/adapters/postgresql.js +172 -172
  129. package/server/models/adapters/sqlite.js +7 -7
  130. package/server/models/db.js +740 -681
  131. package/server/observability/failure-analysis.js +337 -337
  132. package/server/observability/index.js +394 -394
  133. package/server/protocol/capabilities.js +223 -223
  134. package/server/protocol/index.js +243 -243
  135. package/server/protocol/schema.js +584 -584
  136. package/server/registry/certification.js +271 -271
  137. package/server/registry/index.js +326 -326
  138. package/server/routes/admin-plans.js +76 -0
  139. package/server/routes/admin-premium.js +673 -671
  140. package/server/routes/admin-shieldqr.js +90 -0
  141. package/server/routes/admin-trust-monitor.js +83 -0
  142. package/server/routes/admin.js +549 -261
  143. package/server/routes/ads.js +130 -130
  144. package/server/routes/agent-workspace.js +540 -540
  145. package/server/routes/api.js +150 -150
  146. package/server/routes/auth.js +71 -71
  147. package/server/routes/billing.js +57 -45
  148. package/server/routes/commander.js +316 -316
  149. package/server/routes/demo-showcase.js +332 -332
  150. package/server/routes/demo-store.js +154 -0
  151. package/server/routes/discovery.js +2348 -417
  152. package/server/routes/gateway.js +173 -157
  153. package/server/routes/governance.js +208 -0
  154. package/server/routes/license.js +251 -240
  155. package/server/routes/mesh.js +469 -469
  156. package/server/routes/noscript.js +543 -543
  157. package/server/routes/plans.js +33 -0
  158. package/server/routes/premium-v2.js +686 -686
  159. package/server/routes/premium.js +724 -724
  160. package/server/routes/providers.js +650 -0
  161. package/server/routes/runtime.js +2148 -2147
  162. package/server/routes/shieldqr.js +88 -0
  163. package/server/routes/sovereign.js +465 -385
  164. package/server/routes/universal.js +200 -185
  165. package/server/routes/wab-api.js +850 -501
  166. package/server/runtime/container-worker.js +111 -111
  167. package/server/runtime/container.js +448 -448
  168. package/server/runtime/distributed-worker.js +362 -362
  169. package/server/runtime/event-bus.js +210 -210
  170. package/server/runtime/index.js +253 -253
  171. package/server/runtime/queue.js +599 -599
  172. package/server/runtime/replay.js +666 -666
  173. package/server/runtime/sandbox.js +266 -266
  174. package/server/runtime/scheduler.js +534 -534
  175. package/server/runtime/session-engine.js +293 -293
  176. package/server/runtime/state-manager.js +188 -188
  177. package/server/security/cross-site-redactor.js +196 -0
  178. package/server/security/dry-run.js +180 -0
  179. package/server/security/human-gate-rate-limit.js +147 -0
  180. package/server/security/human-gate-transports.js +178 -0
  181. package/server/security/human-gate.js +281 -0
  182. package/server/security/index.js +368 -368
  183. package/server/security/intent-engine.js +245 -0
  184. package/server/security/reward-guard.js +171 -0
  185. package/server/security/rollback-store.js +239 -0
  186. package/server/security/token-scope.js +404 -0
  187. package/server/security/url-policy.js +139 -0
  188. package/server/services/agent-chat.js +506 -506
  189. package/server/services/agent-learning.js +601 -575
  190. package/server/services/agent-memory.js +625 -625
  191. package/server/services/agent-mesh.js +555 -539
  192. package/server/services/agent-symphony.js +717 -717
  193. package/server/services/agent-tasks.js +1807 -1807
  194. package/server/services/api-key-engine.js +292 -261
  195. package/server/services/cluster.js +894 -894
  196. package/server/services/commander.js +738 -738
  197. package/server/services/edge-compute.js +440 -440
  198. package/server/services/email.js +233 -204
  199. package/server/services/governance.js +466 -0
  200. package/server/services/hosted-runtime.js +205 -205
  201. package/server/services/lfd.js +635 -635
  202. package/server/services/local-ai.js +389 -389
  203. package/server/services/marketplace.js +270 -270
  204. package/server/services/metering.js +182 -182
  205. package/server/services/modules/affiliate-intelligence.js +93 -93
  206. package/server/services/modules/agent-firewall.js +90 -90
  207. package/server/services/modules/bounty.js +89 -89
  208. package/server/services/modules/collective-bargaining.js +92 -92
  209. package/server/services/modules/dark-pattern.js +66 -66
  210. package/server/services/modules/gov-intelligence.js +45 -45
  211. package/server/services/modules/neural.js +55 -55
  212. package/server/services/modules/notary.js +49 -49
  213. package/server/services/modules/price-time-machine.js +86 -86
  214. package/server/services/modules/protocol.js +104 -104
  215. package/server/services/negotiation.js +439 -439
  216. package/server/services/plans.js +214 -0
  217. package/server/services/plugins.js +771 -771
  218. package/server/services/premium.js +1 -1
  219. package/server/services/price-intelligence.js +566 -566
  220. package/server/services/price-shield.js +1137 -1137
  221. package/server/services/provider-clients.js +740 -0
  222. package/server/services/reputation.js +465 -465
  223. package/server/services/search-engine.js +357 -357
  224. package/server/services/security.js +513 -513
  225. package/server/services/self-healing.js +843 -843
  226. package/server/services/shieldqr.js +322 -0
  227. package/server/services/sovereign-shield.js +542 -0
  228. package/server/services/ssl-inspector.js +42 -0
  229. package/server/services/ssl-monitor.js +167 -0
  230. package/server/services/stripe.js +205 -192
  231. package/server/services/swarm.js +788 -788
  232. package/server/services/universal-scraper.js +662 -661
  233. package/server/services/verification.js +481 -481
  234. package/server/services/vision.js +1163 -1163
  235. package/server/services/wab-crypto.js +178 -0
  236. package/server/utils/cache.js +125 -125
  237. package/server/utils/migrate.js +81 -81
  238. package/server/utils/safe-fetch.js +228 -0
  239. package/server/utils/secureFields.js +50 -50
  240. package/server/ws.js +161 -161
  241. package/templates/artisan-marketplace.yaml +104 -104
  242. package/templates/book-price-scout.yaml +98 -98
  243. package/templates/electronics-price-tracker.yaml +108 -108
  244. package/templates/flight-deal-hunter.yaml +113 -113
  245. package/templates/freelancer-direct.yaml +116 -116
  246. package/templates/grocery-price-compare.yaml +93 -93
  247. package/templates/hotel-direct-booking.yaml +113 -113
  248. package/templates/local-services.yaml +98 -98
  249. package/templates/olive-oil-tunisia.yaml +88 -88
  250. package/templates/organic-farm-fresh.yaml +101 -101
  251. package/templates/restaurant-direct.yaml +97 -97
  252. package/public/score.html +0 -263
  253. package/server/migrations/006_growth_suite.sql +0 -138
  254. package/server/routes/growth.js +0 -962
  255. package/server/services/fairness-engine.js +0 -409
  256. package/server/services/fairness.js +0 -420
@@ -0,0 +1,740 @@
1
+ /**
2
+ * provider-clients.js — server-side adapters for managed DNS providers.
3
+ *
4
+ * Each adapter implements:
5
+ * testCredentials(creds, config) -> { ok, detail }
6
+ * listDomains(creds, config) -> [{ domain, zone_id }]
7
+ * enableWAB(creds, config, domain, txtValue) -> { ok, detail, recordId? }
8
+ * disableWAB(creds, config, domain) -> { ok, detail }
9
+ *
10
+ * Credentials are stored AES-256-GCM encrypted in provider_accounts.credentials.
11
+ * They are decrypted only inside this module, in-memory, per request.
12
+ *
13
+ * Outbound requests use safeFetch (SSRF-resistant, redirect-validated).
14
+ */
15
+
16
+ 'use strict';
17
+
18
+ const crypto = require('crypto');
19
+ const { safeFetch } = require('../utils/safe-fetch');
20
+
21
+ /* ───────────────────────────── helpers ──────────────────────────────── */
22
+
23
+ async function jsonOrThrow(res, providerName) {
24
+ const text = await res.text();
25
+ let body = null;
26
+ try { body = text ? JSON.parse(text) : null; } catch { /* keep raw */ }
27
+ if (!res.ok) {
28
+ const detail = (body && (body.error || body.message || body.errors || body.Code)) || text || res.statusText;
29
+ const err = new Error(`${providerName} ${res.status}: ${typeof detail === 'string' ? detail.slice(0, 240) : JSON.stringify(detail).slice(0, 240)}`);
30
+ err.status = res.status;
31
+ err.body = body;
32
+ throw err;
33
+ }
34
+ return body;
35
+ }
36
+
37
+ function withTimeout(ms = 12000, max = 256 * 1024) {
38
+ return { timeoutMs: ms, maxBytes: max };
39
+ }
40
+
41
+ // cPanel + Plesk + WHM commonly use non-standard ports.
42
+ const CPANEL_PORTS = [80, 443, 2082, 2083, 2086, 2087];
43
+ const PLESK_PORTS = [80, 443, 8443, 8880];
44
+ function withCpanelOpts() { return { ...withTimeout(15000, 1024 * 1024), allowedPorts: CPANEL_PORTS }; }
45
+ function withPleskOpts() { return { ...withTimeout(15000, 1024 * 1024), allowedPorts: PLESK_PORTS }; }
46
+
47
+ /* ─────────────────────────── 1. Cloudflare ──────────────────────────── */
48
+ // Credentials: { api_token } — Account/Zone-scoped Cloudflare API token.
49
+
50
+ const cloudflare = {
51
+ type: 'cloudflare',
52
+ label: 'Cloudflare',
53
+ credential_fields: [
54
+ { key: 'api_token', label: 'API Token', type: 'password', required: true,
55
+ help: 'Create at https://dash.cloudflare.com/profile/api-tokens with Zone:Read + Zone:DNS:Edit.' },
56
+ ],
57
+
58
+ async testCredentials({ api_token }) {
59
+ const res = await safeFetch(
60
+ 'https://api.cloudflare.com/client/v4/user/tokens/verify',
61
+ { headers: { Authorization: `Bearer ${api_token}` } },
62
+ withTimeout()
63
+ );
64
+ const body = await jsonOrThrow(res, 'Cloudflare');
65
+ return { ok: !!(body && body.success), detail: (body && body.result && body.result.status) || 'unknown' };
66
+ },
67
+
68
+ async listDomains({ api_token }) {
69
+ const res = await safeFetch(
70
+ 'https://api.cloudflare.com/client/v4/zones?per_page=50',
71
+ { headers: { Authorization: `Bearer ${api_token}` } },
72
+ withTimeout()
73
+ );
74
+ const body = await jsonOrThrow(res, 'Cloudflare');
75
+ return (body.result || []).map(z => ({ domain: z.name, zone_id: z.id, status: z.status }));
76
+ },
77
+
78
+ async _findRecord({ api_token }, zone_id) {
79
+ const url = `https://api.cloudflare.com/client/v4/zones/${zone_id}/dns_records?type=TXT&name=_wab.${(await this._zoneName({ api_token }, zone_id))}`;
80
+ const res = await safeFetch(url, { headers: { Authorization: `Bearer ${api_token}` } }, withTimeout());
81
+ const body = await jsonOrThrow(res, 'Cloudflare');
82
+ return (body.result || [])[0] || null;
83
+ },
84
+
85
+ async _zoneName({ api_token }, zone_id) {
86
+ const res = await safeFetch(
87
+ `https://api.cloudflare.com/client/v4/zones/${zone_id}`,
88
+ { headers: { Authorization: `Bearer ${api_token}` } },
89
+ withTimeout()
90
+ );
91
+ const body = await jsonOrThrow(res, 'Cloudflare');
92
+ return body.result.name;
93
+ },
94
+
95
+ async enableWAB({ api_token }, _config, domain, txtValue, opts = {}) {
96
+ const zone_id = opts.zone_id || (await this._zoneIdForDomain({ api_token }, domain));
97
+ if (!zone_id) throw new Error('Zone not found for ' + domain);
98
+ const existing = await this._findRecord({ api_token }, zone_id);
99
+ const payload = { type: 'TXT', name: '_wab', content: txtValue, ttl: 3600 };
100
+ let res;
101
+ if (existing) {
102
+ res = await safeFetch(
103
+ `https://api.cloudflare.com/client/v4/zones/${zone_id}/dns_records/${existing.id}`,
104
+ { method: 'PUT', headers: { Authorization: `Bearer ${api_token}`, 'Content-Type': 'application/json' }, body: JSON.stringify(payload) },
105
+ withTimeout()
106
+ );
107
+ } else {
108
+ res = await safeFetch(
109
+ `https://api.cloudflare.com/client/v4/zones/${zone_id}/dns_records`,
110
+ { method: 'POST', headers: { Authorization: `Bearer ${api_token}`, 'Content-Type': 'application/json' }, body: JSON.stringify(payload) },
111
+ withTimeout()
112
+ );
113
+ }
114
+ const body = await jsonOrThrow(res, 'Cloudflare');
115
+ return { ok: !!body.success, recordId: body.result && body.result.id, detail: existing ? 'updated' : 'created' };
116
+ },
117
+
118
+ async disableWAB({ api_token }, _config, domain, opts = {}) {
119
+ const zone_id = opts.zone_id || (await this._zoneIdForDomain({ api_token }, domain));
120
+ if (!zone_id) throw new Error('Zone not found for ' + domain);
121
+ const existing = await this._findRecord({ api_token }, zone_id);
122
+ if (!existing) return { ok: true, detail: 'already-absent' };
123
+ const res = await safeFetch(
124
+ `https://api.cloudflare.com/client/v4/zones/${zone_id}/dns_records/${existing.id}`,
125
+ { method: 'DELETE', headers: { Authorization: `Bearer ${api_token}` } },
126
+ withTimeout()
127
+ );
128
+ await jsonOrThrow(res, 'Cloudflare');
129
+ return { ok: true, detail: 'deleted' };
130
+ },
131
+
132
+ async _zoneIdForDomain({ api_token }, domain) {
133
+ const res = await safeFetch(
134
+ `https://api.cloudflare.com/client/v4/zones?name=${encodeURIComponent(domain)}`,
135
+ { headers: { Authorization: `Bearer ${api_token}` } },
136
+ withTimeout()
137
+ );
138
+ const body = await jsonOrThrow(res, 'Cloudflare');
139
+ return (body.result || [])[0] && body.result[0].id;
140
+ },
141
+ };
142
+
143
+ /* ─────────────────────────── 2. GoDaddy ─────────────────────────────── */
144
+ // Credentials: { api_key, api_secret }
145
+
146
+ const godaddy = {
147
+ type: 'godaddy',
148
+ label: 'GoDaddy',
149
+ credential_fields: [
150
+ { key: 'api_key', label: 'API Key', type: 'text', required: true },
151
+ { key: 'api_secret', label: 'API Secret', type: 'password', required: true,
152
+ help: 'Production keys at https://developer.godaddy.com/keys (50+ domain accounts only).' },
153
+ ],
154
+
155
+ _hdr({ api_key, api_secret }) {
156
+ return { Authorization: `sso-key ${api_key}:${api_secret}`, 'Content-Type': 'application/json' };
157
+ },
158
+
159
+ async testCredentials(creds) {
160
+ const res = await safeFetch('https://api.godaddy.com/v1/domains?limit=1', { headers: this._hdr(creds) }, withTimeout());
161
+ if (!res.ok) {
162
+ const text = await res.text();
163
+ throw new Error(`GoDaddy ${res.status}: ${text.slice(0, 200)}`);
164
+ }
165
+ return { ok: true, detail: 'auth-ok' };
166
+ },
167
+
168
+ async listDomains(creds) {
169
+ const res = await safeFetch('https://api.godaddy.com/v1/domains?limit=200', { headers: this._hdr(creds) }, withTimeout(15000, 1024 * 1024));
170
+ const body = await jsonOrThrow(res, 'GoDaddy');
171
+ return (body || []).map(d => ({ domain: d.domain, zone_id: null, status: d.status }));
172
+ },
173
+
174
+ async enableWAB(creds, _config, domain, txtValue) {
175
+ const url = `https://api.godaddy.com/v1/domains/${encodeURIComponent(domain)}/records/TXT/_wab`;
176
+ const res = await safeFetch(url, {
177
+ method: 'PUT', headers: this._hdr(creds), body: JSON.stringify([{ data: txtValue, ttl: 3600 }]),
178
+ }, withTimeout());
179
+ if (!res.ok) throw new Error(`GoDaddy ${res.status}: ${await res.text()}`);
180
+ return { ok: true, detail: 'put' };
181
+ },
182
+
183
+ async disableWAB(creds, _config, domain) {
184
+ const url = `https://api.godaddy.com/v1/domains/${encodeURIComponent(domain)}/records/TXT/_wab`;
185
+ const res = await safeFetch(url, {
186
+ method: 'PUT', headers: this._hdr(creds), body: '[]',
187
+ }, withTimeout());
188
+ if (!res.ok) throw new Error(`GoDaddy ${res.status}: ${await res.text()}`);
189
+ return { ok: true, detail: 'cleared' };
190
+ },
191
+ };
192
+
193
+ /* ─────────────────────────── 3. Azure DNS ───────────────────────────── */
194
+ // Credentials: { tenant_id, client_id, client_secret }
195
+ // Config: { subscription_id, resource_group, zone_name }
196
+
197
+ const azure = {
198
+ type: 'azure',
199
+ label: 'Azure DNS',
200
+ credential_fields: [
201
+ { key: 'tenant_id', label: 'Tenant ID', type: 'text', required: true },
202
+ { key: 'client_id', label: 'Client ID (App Registration)', type: 'text', required: true },
203
+ { key: 'client_secret', label: 'Client Secret', type: 'password', required: true,
204
+ help: 'Service Principal must have "DNS Zone Contributor" role on the zone.' },
205
+ ],
206
+ config_fields: [
207
+ { key: 'subscription_id', label: 'Subscription ID', type: 'text', required: true },
208
+ { key: 'resource_group', label: 'Resource Group', type: 'text', required: true },
209
+ { key: 'zone_name', label: 'DNS Zone Name', type: 'text', required: true,
210
+ help: 'The zone you want to manage, e.g. example.com' },
211
+ ],
212
+
213
+ async _accessToken({ tenant_id, client_id, client_secret }) {
214
+ const url = `https://login.microsoftonline.com/${encodeURIComponent(tenant_id)}/oauth2/v2.0/token`;
215
+ const body = new URLSearchParams({
216
+ grant_type: 'client_credentials', client_id, client_secret,
217
+ scope: 'https://management.azure.com/.default',
218
+ });
219
+ const res = await safeFetch(url, {
220
+ method: 'POST', headers: { 'Content-Type': 'application/x-www-form-urlencoded' }, body: body.toString(),
221
+ }, withTimeout());
222
+ const j = await jsonOrThrow(res, 'Azure AD');
223
+ if (!j.access_token) throw new Error('Azure: no access_token returned');
224
+ return j.access_token;
225
+ },
226
+
227
+ async testCredentials(creds, config) {
228
+ const token = await this._accessToken(creds);
229
+ if (!config || !config.subscription_id) return { ok: true, detail: 'auth-ok' };
230
+ const url = `https://management.azure.com/subscriptions/${encodeURIComponent(config.subscription_id)}` +
231
+ (config.resource_group && config.zone_name
232
+ ? `/resourceGroups/${encodeURIComponent(config.resource_group)}/providers/Microsoft.Network/dnsZones/${encodeURIComponent(config.zone_name)}?api-version=2018-05-01`
233
+ : '?api-version=2022-12-01');
234
+ const res = await safeFetch(url, { headers: { Authorization: `Bearer ${token}` } }, withTimeout());
235
+ if (!res.ok && res.status !== 404) throw new Error(`Azure ${res.status}: ${(await res.text()).slice(0, 240)}`);
236
+ return { ok: true, detail: res.ok ? 'zone-found' : 'auth-ok-zone-missing' };
237
+ },
238
+
239
+ async listDomains(creds, config) {
240
+ if (!config || !config.zone_name) return [];
241
+ return [{ domain: config.zone_name, zone_id: config.zone_name, status: 'configured' }];
242
+ },
243
+
244
+ async enableWAB(creds, config, domain, txtValue) {
245
+ const token = await this._accessToken(creds);
246
+ const url = `https://management.azure.com/subscriptions/${encodeURIComponent(config.subscription_id)}` +
247
+ `/resourceGroups/${encodeURIComponent(config.resource_group)}/providers/Microsoft.Network/dnsZones/` +
248
+ `${encodeURIComponent(config.zone_name)}/TXT/_wab?api-version=2018-05-01`;
249
+ const res = await safeFetch(url, {
250
+ method: 'PUT', headers: { Authorization: `Bearer ${token}`, 'Content-Type': 'application/json' },
251
+ body: JSON.stringify({ properties: { TTL: 3600, TXTRecords: [{ value: [txtValue] }] } }),
252
+ }, withTimeout());
253
+ if (!res.ok) throw new Error(`Azure ${res.status}: ${(await res.text()).slice(0, 240)}`);
254
+ return { ok: true, detail: 'put' };
255
+ },
256
+
257
+ async disableWAB(creds, config) {
258
+ const token = await this._accessToken(creds);
259
+ const url = `https://management.azure.com/subscriptions/${encodeURIComponent(config.subscription_id)}` +
260
+ `/resourceGroups/${encodeURIComponent(config.resource_group)}/providers/Microsoft.Network/dnsZones/` +
261
+ `${encodeURIComponent(config.zone_name)}/TXT/_wab?api-version=2018-05-01`;
262
+ const res = await safeFetch(url, { method: 'DELETE', headers: { Authorization: `Bearer ${token}` } }, withTimeout());
263
+ if (!res.ok && res.status !== 404) throw new Error(`Azure ${res.status}: ${(await res.text()).slice(0, 240)}`);
264
+ return { ok: true, detail: res.status === 404 ? 'already-absent' : 'deleted' };
265
+ },
266
+ };
267
+
268
+ /* ─────────────────────────── 4. GCP DNS ─────────────────────────────── */
269
+ // Credentials: { service_account_json } — full JSON key file pasted in.
270
+
271
+ const gcp = {
272
+ type: 'gcp',
273
+ label: 'Google Cloud DNS',
274
+ credential_fields: [
275
+ { key: 'service_account_json', label: 'Service Account JSON', type: 'textarea', required: true,
276
+ help: 'Paste the full JSON key. Service account must have "DNS Administrator" role.' },
277
+ ],
278
+ config_fields: [
279
+ { key: 'project_id', label: 'Project ID', type: 'text', required: true },
280
+ { key: 'managed_zone', label: 'Managed Zone Name', type: 'text', required: true,
281
+ help: 'Cloud DNS zone resource name (not the DNS name).' },
282
+ ],
283
+
284
+ _parseSA(json) {
285
+ let sa;
286
+ try { sa = typeof json === 'string' ? JSON.parse(json) : json; }
287
+ catch (e) { throw new Error('Invalid service account JSON: ' + e.message); }
288
+ if (!sa.client_email || !sa.private_key) throw new Error('SA JSON missing client_email/private_key');
289
+ return sa;
290
+ },
291
+
292
+ async _accessToken({ service_account_json }) {
293
+ const sa = this._parseSA(service_account_json);
294
+ const now = Math.floor(Date.now() / 1000);
295
+ const header = { alg: 'RS256', typ: 'JWT' };
296
+ const claim = {
297
+ iss: sa.client_email, scope: 'https://www.googleapis.com/auth/ndev.clouddns.readwrite',
298
+ aud: 'https://oauth2.googleapis.com/token', exp: now + 3600, iat: now,
299
+ };
300
+ const b64u = (b) => Buffer.from(b).toString('base64').replace(/=+$/, '').replace(/\+/g, '-').replace(/\//g, '_');
301
+ const headerB = b64u(JSON.stringify(header));
302
+ const claimB = b64u(JSON.stringify(claim));
303
+ const signing = `${headerB}.${claimB}`;
304
+ const sig = crypto.createSign('RSA-SHA256').update(signing).sign(sa.private_key);
305
+ const jwt = `${signing}.${sig.toString('base64').replace(/=+$/, '').replace(/\+/g, '-').replace(/\//g, '_')}`;
306
+
307
+ const res = await safeFetch('https://oauth2.googleapis.com/token', {
308
+ method: 'POST', headers: { 'Content-Type': 'application/x-www-form-urlencoded' },
309
+ body: `grant_type=urn:ietf:params:oauth:grant-type:jwt-bearer&assertion=${encodeURIComponent(jwt)}`,
310
+ }, withTimeout());
311
+ const j = await jsonOrThrow(res, 'Google OAuth');
312
+ return j.access_token;
313
+ },
314
+
315
+ async testCredentials(creds, config) {
316
+ const token = await this._accessToken(creds);
317
+ if (!config || !config.project_id || !config.managed_zone) return { ok: true, detail: 'auth-ok' };
318
+ const url = `https://dns.googleapis.com/dns/v1/projects/${encodeURIComponent(config.project_id)}/managedZones/${encodeURIComponent(config.managed_zone)}`;
319
+ const res = await safeFetch(url, { headers: { Authorization: `Bearer ${token}` } }, withTimeout());
320
+ if (!res.ok) throw new Error(`GCP ${res.status}: ${(await res.text()).slice(0, 240)}`);
321
+ return { ok: true, detail: 'zone-found' };
322
+ },
323
+
324
+ async listDomains(creds, config) {
325
+ if (!config || !config.project_id) return [];
326
+ const token = await this._accessToken(creds);
327
+ const res = await safeFetch(
328
+ `https://dns.googleapis.com/dns/v1/projects/${encodeURIComponent(config.project_id)}/managedZones`,
329
+ { headers: { Authorization: `Bearer ${token}` } }, withTimeout(15000, 1024 * 1024)
330
+ );
331
+ const body = await jsonOrThrow(res, 'GCP');
332
+ return (body.managedZones || []).map(z => ({ domain: (z.dnsName || '').replace(/\.$/, ''), zone_id: z.name, status: z.visibility }));
333
+ },
334
+
335
+ async _existing(token, project_id, managed_zone, fqdn) {
336
+ const url = `https://dns.googleapis.com/dns/v1/projects/${encodeURIComponent(project_id)}/managedZones/${encodeURIComponent(managed_zone)}/rrsets?name=${encodeURIComponent(fqdn)}&type=TXT`;
337
+ const res = await safeFetch(url, { headers: { Authorization: `Bearer ${token}` } }, withTimeout());
338
+ const j = await jsonOrThrow(res, 'GCP');
339
+ return (j.rrsets || [])[0] || null;
340
+ },
341
+
342
+ async _change(token, project_id, managed_zone, body) {
343
+ const url = `https://dns.googleapis.com/dns/v1/projects/${encodeURIComponent(project_id)}/managedZones/${encodeURIComponent(managed_zone)}/changes`;
344
+ const res = await safeFetch(url, {
345
+ method: 'POST', headers: { Authorization: `Bearer ${token}`, 'Content-Type': 'application/json' },
346
+ body: JSON.stringify(body),
347
+ }, withTimeout());
348
+ if (!res.ok) throw new Error(`GCP ${res.status}: ${(await res.text()).slice(0, 240)}`);
349
+ return jsonOrThrow(res, 'GCP');
350
+ },
351
+
352
+ async enableWAB(creds, config, domain, txtValue) {
353
+ const token = await this._accessToken(creds);
354
+ const fqdn = `_wab.${domain}.`;
355
+ const existing = await this._existing(token, config.project_id, config.managed_zone, fqdn);
356
+ const additions = [{ name: fqdn, type: 'TXT', ttl: 3600, rrdatas: [`"${txtValue}"`] }];
357
+ const body = existing ? { additions, deletions: [existing] } : { additions };
358
+ await this._change(token, config.project_id, config.managed_zone, body);
359
+ return { ok: true, detail: existing ? 'updated' : 'created' };
360
+ },
361
+
362
+ async disableWAB(creds, config, domain) {
363
+ const token = await this._accessToken(creds);
364
+ const fqdn = `_wab.${domain}.`;
365
+ const existing = await this._existing(token, config.project_id, config.managed_zone, fqdn);
366
+ if (!existing) return { ok: true, detail: 'already-absent' };
367
+ await this._change(token, config.project_id, config.managed_zone, { deletions: [existing] });
368
+ return { ok: true, detail: 'deleted' };
369
+ },
370
+ };
371
+
372
+ /* ─────────────────────────── 5. Route 53 ────────────────────────────── */
373
+ // Credentials: { access_key_id, secret_access_key }
374
+ // Config: { hosted_zone_id }
375
+
376
+ const route53 = {
377
+ type: 'route53',
378
+ label: 'AWS Route 53',
379
+ credential_fields: [
380
+ { key: 'access_key_id', label: 'AWS Access Key ID', type: 'text', required: true },
381
+ { key: 'secret_access_key', label: 'AWS Secret Access Key', type: 'password', required: true,
382
+ help: 'IAM user/role needs route53:ChangeResourceRecordSets + ListResourceRecordSets on the hosted zone.' },
383
+ ],
384
+ config_fields: [
385
+ { key: 'hosted_zone_id', label: 'Hosted Zone ID', type: 'text', required: true,
386
+ help: 'e.g. Z2FDTNDATAQYW2 — find in Route 53 console.' },
387
+ ],
388
+
389
+ async _sigv4Request({ access_key_id, secret_access_key }, method, path, body, query = '') {
390
+ const region = 'us-east-1';
391
+ const service = 'route53';
392
+ const host = 'route53.amazonaws.com';
393
+ const now = new Date();
394
+ const amzDate = now.toISOString().replace(/[:-]|\.\d{3}/g, '');
395
+ const dateStamp = amzDate.slice(0, 8);
396
+
397
+ const payloadHash = crypto.createHash('sha256').update(body || '').digest('hex');
398
+ const canonHeaders = `host:${host}\nx-amz-date:${amzDate}\n`;
399
+ const signedHeaders = 'host;x-amz-date';
400
+ const canonRequest = [method, path, query, canonHeaders, signedHeaders, payloadHash].join('\n');
401
+
402
+ const algo = 'AWS4-HMAC-SHA256';
403
+ const credScope = `${dateStamp}/${region}/${service}/aws4_request`;
404
+ const stringToSign = [algo, amzDate, credScope, crypto.createHash('sha256').update(canonRequest).digest('hex')].join('\n');
405
+
406
+ const kDate = crypto.createHmac('sha256', 'AWS4' + secret_access_key).update(dateStamp).digest();
407
+ const kRegion = crypto.createHmac('sha256', kDate).update(region).digest();
408
+ const kService = crypto.createHmac('sha256', kRegion).update(service).digest();
409
+ const kSigning = crypto.createHmac('sha256', kService).update('aws4_request').digest();
410
+ const sig = crypto.createHmac('sha256', kSigning).update(stringToSign).digest('hex');
411
+
412
+ const auth = `${algo} Credential=${access_key_id}/${credScope}, SignedHeaders=${signedHeaders}, Signature=${sig}`;
413
+ return {
414
+ url: `https://${host}${path}${query ? '?' + query : ''}`,
415
+ headers: { 'Authorization': auth, 'x-amz-date': amzDate, 'Content-Type': 'text/xml' },
416
+ };
417
+ },
418
+
419
+ async testCredentials(creds, config) {
420
+ const path = config && config.hosted_zone_id
421
+ ? `/2013-04-01/hostedzone/${config.hosted_zone_id}`
422
+ : '/2013-04-01/hostedzone';
423
+ const sig = await this._sigv4Request(creds, 'GET', path, '');
424
+ const res = await safeFetch(sig.url, { headers: sig.headers }, withTimeout());
425
+ if (!res.ok) throw new Error(`Route 53 ${res.status}: ${(await res.text()).slice(0, 240)}`);
426
+ return { ok: true, detail: 'auth-ok' };
427
+ },
428
+
429
+ async listDomains(creds) {
430
+ const sig = await this._sigv4Request(creds, 'GET', '/2013-04-01/hostedzone', '');
431
+ const res = await safeFetch(sig.url, { headers: sig.headers }, withTimeout(15000, 1024 * 1024));
432
+ if (!res.ok) throw new Error(`Route 53 ${res.status}`);
433
+ const xml = await res.text();
434
+ const out = [];
435
+ const re = /<HostedZone>[\s\S]*?<Id>\/hostedzone\/([^<]+)<\/Id>[\s\S]*?<Name>([^<]+)<\/Name>/g;
436
+ let m; while ((m = re.exec(xml))) out.push({ domain: m[2].replace(/\.$/, ''), zone_id: m[1] });
437
+ return out;
438
+ },
439
+
440
+ _changeBody(action, fqdn, txtValue) {
441
+ const escaped = txtValue.replace(/"/g, '\\"');
442
+ return `<?xml version="1.0" encoding="UTF-8"?>
443
+ <ChangeResourceRecordSetsRequest xmlns="https://route53.amazonaws.com/doc/2013-04-01/">
444
+ <ChangeBatch><Changes><Change>
445
+ <Action>${action}</Action>
446
+ <ResourceRecordSet>
447
+ <Name>${fqdn}</Name><Type>TXT</Type><TTL>3600</TTL>
448
+ <ResourceRecords><ResourceRecord><Value>"${escaped}"</Value></ResourceRecord></ResourceRecords>
449
+ </ResourceRecordSet>
450
+ </Change></Changes></ChangeBatch>
451
+ </ChangeResourceRecordSetsRequest>`;
452
+ },
453
+
454
+ async enableWAB(creds, config, domain, txtValue) {
455
+ const fqdn = `_wab.${domain}.`;
456
+ const body = this._changeBody('UPSERT', fqdn, txtValue);
457
+ const sig = await this._sigv4Request(creds, 'POST', `/2013-04-01/hostedzone/${config.hosted_zone_id}/rrset/`, body);
458
+ const res = await safeFetch(sig.url, { method: 'POST', headers: sig.headers, body }, withTimeout());
459
+ if (!res.ok) throw new Error(`Route 53 ${res.status}: ${(await res.text()).slice(0, 240)}`);
460
+ return { ok: true, detail: 'upsert' };
461
+ },
462
+
463
+ async disableWAB(creds, config, domain) {
464
+ const fqdn = `_wab.${domain}.`;
465
+ // Need the existing TXT first to construct DELETE
466
+ const path = `/2013-04-01/hostedzone/${config.hosted_zone_id}/rrset/`;
467
+ const query = `name=${encodeURIComponent(fqdn)}&type=TXT&maxitems=1`;
468
+ const sig0 = await this._sigv4Request(creds, 'GET', path, '', query);
469
+ const r0 = await safeFetch(sig0.url, { headers: sig0.headers }, withTimeout());
470
+ if (!r0.ok) throw new Error(`Route 53 ${r0.status}`);
471
+ const xml = await r0.text();
472
+ const m = /<ResourceRecordSet>([\s\S]*?<Name>_wab\.[\s\S]*?)<\/ResourceRecordSet>/i.exec(xml);
473
+ if (!m) return { ok: true, detail: 'already-absent' };
474
+ const valMatch = /<Value>"?([^<"]+)"?<\/Value>/.exec(m[1]);
475
+ if (!valMatch) return { ok: true, detail: 'already-absent' };
476
+ const body = this._changeBody('DELETE', fqdn, valMatch[1]);
477
+ const sig = await this._sigv4Request(creds, 'POST', path, body);
478
+ const res = await safeFetch(sig.url, { method: 'POST', headers: sig.headers, body }, withTimeout());
479
+ if (!res.ok) throw new Error(`Route 53 ${res.status}: ${(await res.text()).slice(0, 240)}`);
480
+ return { ok: true, detail: 'deleted' };
481
+ },
482
+ };
483
+
484
+ /* ─────────────────────────── 6. cPanel ──────────────────────────────── */
485
+ // Credentials: { username, api_token } + Config: { server_url }
486
+
487
+ const cpanel = {
488
+ type: 'cpanel',
489
+ label: 'cPanel / WHM',
490
+ credential_fields: [
491
+ { key: 'username', label: 'cPanel Username', type: 'text', required: true },
492
+ { key: 'api_token', label: 'API Token', type: 'password', required: true,
493
+ help: 'Create at cPanel → Manage API Tokens.' },
494
+ ],
495
+ config_fields: [
496
+ { key: 'server_url', label: 'cPanel Server URL', type: 'text', required: true,
497
+ help: 'e.g. https://cpanel.example.com:2083 — must be HTTPS.' },
498
+ ],
499
+
500
+ _hdr({ username, api_token }) { return { Authorization: `cpanel ${username}:${api_token}` }; },
501
+
502
+ _validateUrl(server_url) {
503
+ if (!/^https:\/\//i.test(server_url)) throw new Error('cPanel server_url must be HTTPS');
504
+ return server_url.replace(/\/+$/, '');
505
+ },
506
+
507
+ async testCredentials(creds, config) {
508
+ const base = this._validateUrl(config.server_url);
509
+ const url = `${base}/execute/DomainInfo/list_domains`;
510
+ const res = await safeFetch(url, { headers: this._hdr(creds) }, withCpanelOpts());
511
+ const j = await jsonOrThrow(res, 'cPanel');
512
+ if (j.errors && j.errors.length) throw new Error('cPanel: ' + j.errors.join('; '));
513
+ return { ok: true, detail: 'auth-ok' };
514
+ },
515
+
516
+ async listDomains(creds, config) {
517
+ const base = this._validateUrl(config.server_url);
518
+ const res = await safeFetch(`${base}/execute/DomainInfo/list_domains`, { headers: this._hdr(creds) }, withCpanelOpts());
519
+ const j = await jsonOrThrow(res, 'cPanel');
520
+ const data = j.data || {};
521
+ const out = [];
522
+ if (data.main_domain) out.push({ domain: data.main_domain, zone_id: data.main_domain });
523
+ for (const d of data.addon_domains || []) out.push({ domain: d, zone_id: d });
524
+ for (const d of data.parked_domains || []) out.push({ domain: d, zone_id: d });
525
+ return out;
526
+ },
527
+
528
+ async enableWAB(creds, config, domain, txtValue) {
529
+ const base = this._validateUrl(config.server_url);
530
+ const url = `${base}/execute/ZoneEdit/add_zone_record?domain=${encodeURIComponent(domain)}&name=_wab&type=TXT&txtdata=${encodeURIComponent(txtValue)}&ttl=3600`;
531
+ const res = await safeFetch(url, { headers: this._hdr(creds) }, withCpanelOpts());
532
+ const j = await jsonOrThrow(res, 'cPanel');
533
+ if (j.errors && j.errors.length) throw new Error('cPanel: ' + j.errors.join('; '));
534
+ return { ok: true, detail: 'added' };
535
+ },
536
+
537
+ async disableWAB(creds, config, domain) {
538
+ const base = this._validateUrl(config.server_url);
539
+ const fetchUrl = `${base}/execute/ZoneEdit/fetchzone?domain=${encodeURIComponent(domain)}`;
540
+ const fr = await safeFetch(fetchUrl, { headers: this._hdr(creds) }, withCpanelOpts());
541
+ const fj = await jsonOrThrow(fr, 'cPanel');
542
+ const records = (fj.data && fj.data.record) || [];
543
+ const found = records.find(r => r.type === 'TXT' && (r.name === `_wab.${domain}.` || r.name === '_wab'));
544
+ if (!found) return { ok: true, detail: 'already-absent' };
545
+ const url = `${base}/execute/ZoneEdit/remove_zone_record?domain=${encodeURIComponent(domain)}&line=${found.line}`;
546
+ const res = await safeFetch(url, { headers: this._hdr(creds) }, withCpanelOpts());
547
+ const j = await jsonOrThrow(res, 'cPanel');
548
+ if (j.errors && j.errors.length) throw new Error('cPanel: ' + j.errors.join('; '));
549
+ return { ok: true, detail: 'removed' };
550
+ },
551
+ };
552
+
553
+ /* ─────────────────────────── 7. Plesk ───────────────────────────────── */
554
+ // Credentials: { api_key | username+password } + Config: { server_url }
555
+
556
+ const plesk = {
557
+ type: 'plesk',
558
+ label: 'Plesk',
559
+ credential_fields: [
560
+ { key: 'api_key', label: 'API Key', type: 'password', required: true,
561
+ help: 'Plesk → Tools & Settings → REST API → Generate API Key.' },
562
+ ],
563
+ config_fields: [
564
+ { key: 'server_url', label: 'Plesk Server URL', type: 'text', required: true,
565
+ help: 'e.g. https://plesk.example.com:8443 — must be HTTPS.' },
566
+ ],
567
+
568
+ _validateUrl(server_url) {
569
+ if (!/^https:\/\//i.test(server_url)) throw new Error('Plesk server_url must be HTTPS');
570
+ return server_url.replace(/\/+$/, '');
571
+ },
572
+
573
+ _hdr({ api_key }) { return { 'X-API-Key': api_key, 'Content-Type': 'application/json' }; },
574
+
575
+ async testCredentials(creds, config) {
576
+ const base = this._validateUrl(config.server_url);
577
+ const res = await safeFetch(`${base}/api/v2/server`, { headers: this._hdr(creds) }, withPleskOpts());
578
+ if (!res.ok) throw new Error(`Plesk ${res.status}: ${(await res.text()).slice(0, 240)}`);
579
+ return { ok: true, detail: 'auth-ok' };
580
+ },
581
+
582
+ async listDomains(creds, config) {
583
+ const base = this._validateUrl(config.server_url);
584
+ const res = await safeFetch(`${base}/api/v2/domains`, { headers: this._hdr(creds) }, withPleskOpts());
585
+ const j = await jsonOrThrow(res, 'Plesk');
586
+ return (j || []).map(d => ({ domain: d.name, zone_id: d.id, status: d.hosting_type }));
587
+ },
588
+
589
+ async _findRecordId(creds, base, domain) {
590
+ const res = await safeFetch(`${base}/api/v2/dns/records?domain=${encodeURIComponent(domain)}`, { headers: this._hdr(creds) }, withPleskOpts());
591
+ const j = await jsonOrThrow(res, 'Plesk');
592
+ const found = (j || []).find(r => r.type === 'TXT' && (r.host === `_wab.${domain}.` || r.host === '_wab'));
593
+ return found ? found.id : null;
594
+ },
595
+
596
+ async enableWAB(creds, config, domain, txtValue) {
597
+ const base = this._validateUrl(config.server_url);
598
+ const existingId = await this._findRecordId(creds, base, domain);
599
+ if (existingId) {
600
+ await safeFetch(`${base}/api/v2/dns/records/${existingId}`, { method: 'DELETE', headers: this._hdr(creds) }, withPleskOpts());
601
+ }
602
+ const res = await safeFetch(`${base}/api/v2/dns/records`, {
603
+ method: 'POST', headers: this._hdr(creds),
604
+ body: JSON.stringify({ domain, type: 'TXT', host: '_wab', value: txtValue, ttl: 3600 }),
605
+ }, withPleskOpts());
606
+ if (!res.ok) throw new Error(`Plesk ${res.status}: ${(await res.text()).slice(0, 240)}`);
607
+ return { ok: true, detail: existingId ? 'replaced' : 'created' };
608
+ },
609
+
610
+ async disableWAB(creds, config, domain) {
611
+ const base = this._validateUrl(config.server_url);
612
+ const existingId = await this._findRecordId(creds, base, domain);
613
+ if (!existingId) return { ok: true, detail: 'already-absent' };
614
+ const res = await safeFetch(`${base}/api/v2/dns/records/${existingId}`, { method: 'DELETE', headers: this._hdr(creds) }, withPleskOpts());
615
+ if (!res.ok) throw new Error(`Plesk ${res.status}: ${(await res.text()).slice(0, 240)}`);
616
+ return { ok: true, detail: 'deleted' };
617
+ },
618
+ };
619
+
620
+ /* ─────────────────────────── 8. Namecheap ───────────────────────────── */
621
+ // Credentials: { api_user, api_key, client_ip }
622
+
623
+ const namecheap = {
624
+ type: 'namecheap',
625
+ label: 'Namecheap',
626
+ credential_fields: [
627
+ { key: 'api_user', label: 'API User', type: 'text', required: true },
628
+ { key: 'api_key', label: 'API Key', type: 'password', required: true,
629
+ help: 'Enable API at https://ap.www.namecheap.com/settings/tools/apiaccess/' },
630
+ { key: 'client_ip', label: 'Whitelisted IP', type: 'text', required: true,
631
+ help: 'Server-side calls require IP allow-listing. Use this server\'s public IP.' },
632
+ ],
633
+
634
+ async _call(creds, command, params = {}) {
635
+ const url = new URL('https://api.namecheap.com/xml.response');
636
+ url.searchParams.set('ApiUser', creds.api_user);
637
+ url.searchParams.set('UserName', creds.api_user);
638
+ url.searchParams.set('ApiKey', creds.api_key);
639
+ url.searchParams.set('ClientIp', creds.client_ip);
640
+ url.searchParams.set('Command', command);
641
+ for (const [k, v] of Object.entries(params)) url.searchParams.set(k, v);
642
+ const res = await safeFetch(url.toString(), {}, withTimeout(15000, 512 * 1024));
643
+ const xml = await res.text();
644
+ if (xml.includes('Status="ERROR"')) {
645
+ const m = /<Error[^>]*>([^<]+)<\/Error>/.exec(xml);
646
+ throw new Error('Namecheap: ' + (m ? m[1] : 'unknown error'));
647
+ }
648
+ return xml;
649
+ },
650
+
651
+ async testCredentials(creds) {
652
+ await this._call(creds, 'namecheap.domains.getList', { PageSize: '10' });
653
+ return { ok: true, detail: 'auth-ok' };
654
+ },
655
+
656
+ async listDomains(creds) {
657
+ const xml = await this._call(creds, 'namecheap.domains.getList', { PageSize: '100' });
658
+ const out = [];
659
+ const re = /<Domain[^>]*Name="([^"]+)"[^>]*>/g;
660
+ let m; while ((m = re.exec(xml))) out.push({ domain: m[1], zone_id: null });
661
+ return out;
662
+ },
663
+
664
+ _splitDomain(domain) {
665
+ const parts = domain.split('.');
666
+ if (parts.length < 2) throw new Error('Invalid domain: ' + domain);
667
+ return { sld: parts[0], tld: parts.slice(1).join('.') };
668
+ },
669
+
670
+ async _getHosts(creds, sld, tld) {
671
+ const xml = await this._call(creds, 'namecheap.domains.dns.getHosts', { SLD: sld, TLD: tld });
672
+ const out = [];
673
+ const re = /<host\s+([^/]+)\/>/g;
674
+ let m;
675
+ while ((m = re.exec(xml))) {
676
+ const attrs = {};
677
+ const ar = /(\w+)="([^"]*)"/g;
678
+ let am; while ((am = ar.exec(m[1]))) attrs[am[1]] = am[2];
679
+ out.push({
680
+ Name: attrs.Name, Type: attrs.Type, Address: attrs.Address,
681
+ MXPref: attrs.MXPref || '10', TTL: attrs.TTL || '1800',
682
+ });
683
+ }
684
+ return out;
685
+ },
686
+
687
+ async _setHosts(creds, sld, tld, hosts) {
688
+ const params = { SLD: sld, TLD: tld };
689
+ hosts.forEach((h, i) => {
690
+ const n = i + 1;
691
+ params[`HostName${n}`] = h.Name;
692
+ params[`RecordType${n}`] = h.Type;
693
+ params[`Address${n}`] = h.Address;
694
+ params[`MXPref${n}`] = h.MXPref || '10';
695
+ params[`TTL${n}`] = h.TTL || '1800';
696
+ });
697
+ await this._call(creds, 'namecheap.domains.dns.setHosts', params);
698
+ },
699
+
700
+ async enableWAB(creds, _config, domain, txtValue) {
701
+ const { sld, tld } = this._splitDomain(domain);
702
+ const existing = await this._getHosts(creds, sld, tld);
703
+ const others = existing.filter(h => !(h.Type === 'TXT' && h.Name === '_wab'));
704
+ const next = [...others, { Name: '_wab', Type: 'TXT', Address: txtValue, MXPref: '10', TTL: '1800' }];
705
+ await this._setHosts(creds, sld, tld, next);
706
+ return { ok: true, detail: `set ${next.length} hosts` };
707
+ },
708
+
709
+ async disableWAB(creds, _config, domain) {
710
+ const { sld, tld } = this._splitDomain(domain);
711
+ const existing = await this._getHosts(creds, sld, tld);
712
+ const others = existing.filter(h => !(h.Type === 'TXT' && h.Name === '_wab'));
713
+ if (others.length === existing.length) return { ok: true, detail: 'already-absent' };
714
+ await this._setHosts(creds, sld, tld, others);
715
+ return { ok: true, detail: 'cleared' };
716
+ },
717
+ };
718
+
719
+ /* ─────────────────────────── registry ───────────────────────────────── */
720
+
721
+ const adapters = {
722
+ cloudflare, route53, azure, gcp, cpanel, plesk, godaddy, namecheap,
723
+ };
724
+
725
+ function getAdapter(type) {
726
+ const a = adapters[type];
727
+ if (!a) throw new Error('Unknown provider type: ' + type);
728
+ return a;
729
+ }
730
+
731
+ function listProviders() {
732
+ return Object.values(adapters).map(a => ({
733
+ type: a.type,
734
+ label: a.label,
735
+ credential_fields: a.credential_fields,
736
+ config_fields: a.config_fields || [],
737
+ }));
738
+ }
739
+
740
+ module.exports = { getAdapter, listProviders };